Unstructured data security exchange method based on user behavior credibility

A technology of unstructured data and secure exchange, which is applied in the field of data security exchange, can solve the problems of insufficient consideration of data exchange security, and achieve the effect of improving flexibility or scalability, improving scalability, improving efficiency and security

Active Publication Date: 2013-10-02
STATE GRID CORP OF CHINA +4
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, the research on network data exchange mainly focuses on the efficiency of data exchange, but does not consider enough about the security of data exchange.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Unstructured data security exchange method based on user behavior credibility
  • Unstructured data security exchange method based on user behavior credibility
  • Unstructured data security exchange method based on user behavior credibility

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application.

[0042] figure 1 It shows a component structure diagram of a method for safe exchange of unstructured data provided by the present invention; the unstructured data in this embodiment is a part of user A's information exchanged from the Internet network to the internal network of the enterprise through the isolated exchange system. Secret document D. in,

[0043] ①: Data attribute A of the confidential document D D It is: the document mentioned is a confidential document, the secret level is the first level of business secret, the key word of the document is a technical report, and the catalog that is allowed to be uploaded is a budget report;

[0044] ②: User operation behavior U op It is: the source IP address is IP1, the source port is Port1, the destination IP address ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an unstructured data security exchange method. The method is based on user behavior credibility, and comprises the following steps: step 1, encapsulating data property; step 2, constructing private protocol; step 3, filtering unstructured data; step 4, analyzing user behavior. Compared with the prior art, the unstructured data security exchange method provided by the invention can realize secure and reliable exchange and sharing of unstructured data between heterogeneous networks under the condition of information isolated island.

Description

technical field [0001] The invention relates to a method for safe data exchange, in particular to a method for safe exchange of unstructured data based on trustworthy user behavior. Background technique [0002] According to statistics, currently 20% of enterprise data is structured data, and 80% of data is unstructured or semi-structured data; and the growth rate of structured data in the world today is 32%, while the growth rate of unstructured data 63%. Therefore, many enterprises have realized that structured data is only a small part of enterprise data, while unstructured data has certain specific and continuous value, and this value will have multiple impacts on enterprise business and strategy . [0003] With the increasing improvement of social information construction, the internal informationization of enterprises has been basically completed. Due to the "information island" caused by the difference in the degree of informatization development of various enterpr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 汪晨林为民张涛马媛媛邓松时坚李伟伟周诚叶云
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products